Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

IoT Security

Serious Vulnerabilities Found in Fujifilm X-Ray Devices

Researchers have uncovered serious denial-of-service (DoS) and improper access control vulnerabilities in X-ray devices made by Japanese imaging giant Fujifilm.

Researchers have uncovered serious denial-of-service (DoS) and improper access control vulnerabilities in X-ray devices made by Japanese imaging giant Fujifilm.

The flaws, described in an advisory published this week by ICS-CERT, affect Fuji Computed Radiography (FCR) XC-2 and Capsula X medical imaging products (CR-IR 357) — Capsula products are marketed as Carbon in the United States. The impacted devices are used in the healthcare sector worldwide.

Fujifilm Computed Radiography vulnerabilitiesAccording to ICS-CERT, these systems are impacted by a high-severity vulnerability that allows an attacker to cause a DoS condition that requires a manual reboot of the device (CVE-2019-10948), and a critical flaw related to the lack of authentication mechanisms for Telnet services (CVE-2019-10950). The second bug can be exploited to access the underlying operating system and possibly gain complete control of a vulnerable device.

Marc Ruef and Rocco Gagliardi, researchers at Swiss-based cybersecurity firm Scip AG, have been credited for finding these flaws.

Ruef told SecurityWeek that the vulnerable devices are typically not connected to the internet and exploitation requires access to the local network. Attacks can be launched by hospital employees, patients or visitors, but attacks over the internet may also be possible by compromising another device on the network and through social engineering (i.e., user interaction is required).

The vulnerabilities were discovered during a penetration testing project conducted by Scip for a hospital. Vulnerabilities in other medical products were discovered as part of the same project, including ultrasound devices and DICOM (Digital Imaging and Communications in Medicine) servers, but no details have been made public due to the fact that the impacted vendors are still investigating the findings.

“The [publicly disclosed] details are very limited because addressing issues in medical devices at customer sites usually takes a very long time. We do not want to give attackers too much details to prevent them from exploiting the issues as long as most customers are exposed,” Ruef explained.

Advertisement. Scroll to continue reading.

It appears that Fujifilm has not released firmware updates to patch these vulnerabilities and instead has advised users to enable Secure Host functionality on the devices. This feature blocks out all network traffic, except for traffic coming from the IP address associated with the Fujifilm image acquisition console. Customers have also been advised to secure their networks, including through segmentation and by ensuring that only authorized devices and users are granted access.

Ruef said that while the use of the Secure Host functionality can mitigate the risk, attacks may still be possible if the attacker can spoof or compromise the image acquisition console.

The researcher noted that Fujifilm was informed of the vulnerabilities on February 8, but the vendor only started addressing the issues after ICS-CERT was notified by Scip.

Related: Flaws in Roche Medical Devices Can Put Patients at Risk

Related: Critical Flaws Expose Natus Medical Devices to Remote Attacks

Related: Philips Working on Patches for 35 Flaws in Healthcare Product

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.